❌

Reading view

Burner phones and lead-lined bags: a history of UK security tactics in China

Starmer’s team is wary of spies but such fears are not new – with Theresa May once warned to get dressed under a duvet

When prime ministers travel to China, heightened security arrangements are a given – as is the quiet game of cat and mouse that takes place behind the scenes as each country tests out each other’s tradecraft and capabilities.

Keir Starmer’s team has been issued with burner phones and fresh sim cards, and is using temporary email addresses, to prevent devices being loaded with spyware or UK government servers being hacked into.

Continue reading...

Β© Photograph: Simon Dawson/Simon Dawson/10 Downing Street

Β© Photograph: Simon Dawson/Simon Dawson/10 Downing Street

Β© Photograph: Simon Dawson/Simon Dawson/10 Downing Street

  •  

β€˜All brakes are off’: Russia’s attempt to rein in illicit market for leaked data backfires

Russian state has tolerated parallel probiv market for its convenience but now Ukrainian spies are exploiting it

Russia is scrambling to rein in the country’s sprawling illicit market for leaked personal data, a shadowy ecosystem long exploited by investigative journalists, police and criminal groups.

For more than a decade, Russia’s so-called probiv market – a term derived from the verb β€œto pierce” or β€œto punch into a search bar” – has operated as a parallel information economy built on a network of corrupt officials, traffic police, bank employees and low-level security staff willing to sell access to restricted government or corporate databases.

Continue reading...

Β© Photograph: Alexander Zemlianichenko/AP

Β© Photograph: Alexander Zemlianichenko/AP

Β© Photograph: Alexander Zemlianichenko/AP

  •  

UK β€˜woefully’ unprepared for Chinese and Russian undersea cable sabotage, says report

CSRI finds China and Russia may be coordinating β€˜grey zone’ tactics against vulnerable western infrastructure

China and Russia are stepping up sabotage operations targeting undersea cables and the UK is unprepared to meet the mounting threat, according to new analysis.

A report by the China Strategic Risks Institute (CSRI) analysed 12 incidents in which national authorities had investigated alleged undersea cable sabotage between January 2021 and April 2025. Of the 10 cases in which a suspect vessel was identified, eight were directly linked to China or Russia through flag-state registration or company ownership.

Continue reading...

Β© Photograph: John Leicester/AP

Β© Photograph: John Leicester/AP

Β© Photograph: John Leicester/AP

  •  

European journalists targeted with Paragon Solutions spyware, say researchers

Citizen Lab says it found β€˜digital fingerprints’ of military-grade spyware that Italy has admitted using against activists

The hacking mystery roiling the Italian prime minister Giorgia Meloni’s rightwing government is deepening after researchers said they had found new evidence that two more journalists were targeted using the same military-grade spyware that Italy has admitted to using against activists.

A parliamentary committee overseeing intelligence confirmed earlier this month that Italy had used mercenary spyware made by Israel-based Paragon Solutions against two Italian activists.

Continue reading...

Β© Photograph: Matteo Ciambelli/Reuters

Β© Photograph: Matteo Ciambelli/Reuters

Β© Photograph: Matteo Ciambelli/Reuters

  •  

Russian-led cybercrime network dismantled in global operation

Arrest warrants issued for ringleaders after investigation by police in Europe and North America

European and North American cybercrime investigators say they have dismantled the heart of a malware operation directed by Russian criminals after a global operation involving British, Canadian, Danish, Dutch, French, German and US police.

International arrest warrants have been issued for 20 suspects, most of them living in Russia, by European investigators while indictments were unsealed in the US against 16 individuals.

Continue reading...

Β© Photograph: Andrew Brookes/Getty Images/Image Source

Β© Photograph: Andrew Brookes/Getty Images/Image Source

Β© Photograph: Andrew Brookes/Getty Images/Image Source

  •  
❌